How does a cirt plan help an organization mitigate risk

Assignment Help Management Information Sys
Reference no: EM131549320

Lab Assignment Worksheet: Creating a CIRT Response Plan for a Typical IT Infrastructure

Overview

In this lab, you explained how CIRT plans mitigate risks, you identified where CIRT monitoring and security operation tasks occur throughout an IT infrastructure, you identified the security controls and countermeasures that mitigate risk, and you created a CIRT response plan.

Lab Assignment Questions & Answers

1. What risk-mitigation security controls or security countermeasures do you recommend for the portion of the network for which you created a CIRT response plan? Explain your answer.

2. How does a CIRT plan help an organization mitigate risk?

3. How does the CIRT post-mortem review help mitigate risk?

4. Why is it a good idea to have a protocol analyzer as one of your incident response tools when examining Internet Protocol (IP) Local Area Network (LAN) network performance or connectivity issues?

5. Put the following in the proper sequence:

• Identification:
• Containment:
• Post-Mortem Review:
• Eradication:
• Preparation:
• Recovery:

6. Which step in the CIRT response methodology relates back to the recovery time objective (RTO) for critical IT systems?

7. Which step in the CIRT response methodology requires proper handling of digital evidence?

8. Which step in the CIRT response methodology requires review with executive management?

9. Which step in the CIRT response methodology requires security applications and tools readiness?

Reference no: EM131549320

Questions Cloud

Write a paper discussing role the computer security act play : Research the following laws that relate to computer crime. Write a 12-16 page paper discussing the role The Computer Security Act play in computer crime.
Why can we just calculate the maximum value : Lab Session 7 STATS 220- Why can we just calculate the maximum value for the whole file, rather than having to focus just on the retweet_count column?
Discuss the thecb accountability system : In the article, Differences in Black faculty rank in 4-year Texas Public Universities: A multi-year analysis by Jones and Slate (2014).
What is the demographic factors : Within the article, College Major Choice in STEM: Revisiting Confidence and DemographicFactors, by Moakler and Kim (2014), the researchers sought to determine.
How does a cirt plan help an organization mitigate risk : How does a CIRT plan help an organization mitigate risk? Which step in the CIRT response methodology requires proper handling of digital evidence?
Es technology in professional ?elds : In our discussion of expert systems (ESs) we saw that the increased use of ES technology in professional ?elds has generated some ethical and social concerns.
Create a list of benefits that the business can expect : Create a list of benefits that the business can expect to achieve from implementing the proposed solution.
Explain quasi-experimental design of independent variable : Ofulue (2011) did a quantitative study to identify barriers with the use of Information Communication Technology for bridging the gap in communication.
Should you approach regulation as risk to information system : Should you approach regulations as a risk to information systems? Do you see regulations as important measures to strengthen information security.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Examine the it support requirements for the employee devices

Examine the IT support requirements for the employee devices. Examine potential security risks, data breaches, and lost devices. Provide guidelines on how these risks could be mitigated

  Principles of good metrics program for it

Description of Information Systems - Provide a specific example of how a company illustrates the three key principles of good metrics program for IT.

  Write a comment about the given post

Experts believe that many of today's new terrorist groups are more concerned with continuity rather than change, religious vs. political change. For example, they no longer want a seat at the table, they would rather blow up the table! Do you agre..

  Create an electronic spreadsheet using ms excel

Create an electronic spreadsheet using MS Excel. While you are encouraged to be creative, you will be graded on your ability to demonstrate an understanding of the module content and the ability to use the software application.

  Discuss how you would correct this issue

One criticism of electronic ballots for elections is that while intuitive for younger voters who are familiar with using a mouse to point and click, elderly voters and motor-impaired users will have difficulty controlling a mouse. Discuss how you ..

  Elements of the innovative process

Elements of the Innovative process - Write a paper in which you examine the elements of the innovative process as well as compare and contrast incremental

  Explore the impact of cryptocurrencies on business

Explore economics of cryptocurrencies. Explore the impact of cryptocurrencies on business. Explore how people trust currencies. Explore the social impact of cryptocurrencies. Explore the future applications of the technology.

  What are the consequences

Using your CIKR paper from the previous assignment, continue the risk analysis of your CIKR being impacted by a natural disaster, terrorism or technological event. Answer the following questions for each type of event: (1) what can happen? (2) how..

  Global value chain and global supply chain managementi need

global value chain and global supply chain managementi need help with a 700-1050-word paper analysis differentiating

  Discuss strategic analysis decisions in the next five years

Discuss strategic analysis decisions in the next five years, what we need to watch out for in the information technology (IT) field, and how these decisions will impact the overall company.

  Accounting information system aishow a new accounting

accounting information system aishow a new accounting information system will meet previously unmet user needs.i know

  Test case creation

Using the following pseudocode, provide 3 unique test cases that would help validate your algorithm. Be sure to place the test cases in table showing the input values, and expected output for each test case. You must validate your code using ideate.c..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd